SlideShare a Scribd company logo
1 of 29
Wireless Security Best Practices for
Remote Monitoring Applications
Charlie Stiernberg
Remote Data Acquisition Product Manager, National Instruments
2
A Wireless Security Story…
• The Maroochy Shire sewage treatment plant (Australia)
 Between January and April 2000 the sewage system experienced 47
unexplainable faults
 Millions of liters of sewage were spilled
• On October 31, 2001 Vitek Boden was convicted of:
 26 counts of willfully using a computer to cause damage
 1 count of causing serious environment harm
3
Agenda
• Wireless network security: a history
• IEEE 802.11i security for Wi-Fi networks
• IEEE 802.15.4 for wireless sensor networks
• ZigBee security protocols
• Network design best practices: an IT perspective
4
A Brief History of Wireless Security
• 1897 – Marconi
• 1997 – 802.11, WEP
• 2001 – FMS attack
• 2003 – WPA
• 2004 – 802.11i ratified
• 2006 – WPA2 Mandatory
http://navajopeople.org/navajo-code-talker.htm
5
Common Wireless Network Threats
• Dictionary Attack: brute force method for “guessing”
passwords / credentials
• Man-in-the-Middle Attack: Rogue AP’s “trick” clients
into sending them their security credentials
• Denial of Service (DoS): a flood of packets that
consumes network resources
6
IEEE 802.11 SECURITY
7
IEEE 802.11 Overview
• “Wireless Ethernet”
• High bandwidth for streaming / waveform
measurements
• 10+ years in the IT sector
Version Released Frequency Max PHY Rate Max TCP Rate
802.11 1997 2.4 GHz 2 Mb/s 1 Mbps
802.11b 1999 2.4 GHz 11 Mb/s 14.4 Mbps
802.11a 1999 5 GHz 54 Mb/s 24.4 Mbps
802.11g 2003 2.4 GHz 54 Mb/s 24.4 Mbps
802.11n 2009? 2.4 GHz ~540 Mb/s ~100 Mbps
8
IEEE 802.11 (Wi-Fi) Security
• Three levels of IEEE 802.11 security
 WEP (weak)
 WPA (ok)
 WPA2 (best) <IEEE 802.11i>
• IEEE 802.11i security has two key components
 Encryption = data protection
 Authentication = access control
10
Encryption
• TKIP = Temporal Key Integrity Protocol (WPA)
• AES = Advanced Encryption Standard (WPA2)
 NIST-endorsed standard for government agencies
 FIPS-approved (FIPS 197)
Key size (bits) Number of
alternative keys
Time required at
1 decryption/us
Time required at
106 decryptions/us
32 232 = 4.3 x 109 35.8 minutes 2.15 milliseconds
56 256 = 7.2 x 1016 1,142 years 10 hours
128 2128 = 3.4 x 1038 5.4 x 1024 years 5.4 x 1018 years
Time required for exhaustive key search (brute force attack)
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
12
Authentication
• Three players in 802.11i authentication
 Supplicant = client trying to access network (Wi-Fi DAQ)
 Authenticator = WAP hardwired to secured network
 Authentication Server = verifies identity of client
Supplicant Authenticator Authentication
Sever
13
IEEE 802.1X Port-Controlled Authentication
Uncontrolled Port
Controlled Port
802.1X Traffic
Non-802.1X Traffic (Blocked)
Before Authentication
After Authentication 802.1X Traffic
Non-802.1X Traffic (Blocked)
14
802.1X (EAP-Request Identity)
802.1X (EAP-Response
Identity)
EAP Transport (EAP-Response
Identity)
EAP-specific (mutual)
authentication
EAP Transport (EAP-Success,
PMK)
802.1X (EAP-Success)
Derive Pairwise Master Key (PMK) Derive Pairwise Master Key (PMK)
802.1X Backend EAP Transport
802.1X Message Flow
15
EAP = Extensible Authentication Protocol
• EAP is a framework with different implementations
• ~40 different EAP methods
• Some require passwords/user credentials (PEAP)
• Some require client-side and/or server-side
certificates (EAP-TLS)
• EAP can provide mutual authentication for the network
and the supplicant
16
IEEE 802.15.4 SECURITY
17
IEEE 802.15.4 Overview
Application
ZigBee Application Layer (APL)
ZigBee Network Layer (NWK)
802.15.4 Medium Access Control Layer (MAC)
802.15.4 Physical Layer (PHY)
ZigBee
Security
Service
Provider
End User
ZigBee
Alliance
IEEE 802.15.4
18
IEEE 802.15.4 Security
• Security services defined in the MAC layer
• Access Control List (ACL) Mode
 The MAC maintains a list of hardware devices addresses
with which it will communicate
• Secured Mode adds…
 AES encryption up to 128 bits
 Frame integrity with message integrity code (MIC)
 Sequential freshness appends values to MAC frame to
prevent replay attacks
19
ZigBee Overview
• ZigBee Coordinator – starts and controls the network
• ZigBee Routers – extend network coverage
• ZigBee End Devices – transmit/receive messages
Star Tree Mesh
ZC
ZC
ZC
ZR
ZR
ZR
ZRZRZR
ZR
20
ZigBee Security
• ZigBee security builds on IEEE 802.15.4
 Application and Network Layer security
 Key management for encryption and authentication
• ZigBee Trust Center
 Authenticates joining devices
 Manages key distribution in the network
• Standard Security Mode
• High Security Mode
21
ZigBee Security Keys
Keys are used for encryption & authentication
• Network Keys
 All devices on a ZigBee network share the same key
• Link Keys
 Secure unicast messages between two devices
• Master Keys
 Used as an initial shared secret between two devices to
perform SKKE to generate link key
22
ZigBee Commissioning & Security
• Standard security
 Preconfigured with active network key
 Preconfigured with a Trust Center link key and
address
• High security
 Preconfigured with a Trust Center master key and
address
• Not preconfigured (not recommended)
23
AN IT PERSPECTIVE
24
IT & Engineering Network Convergence
Traditional Model – Separate Networks for
IT/Corporate & Measurement/Control
Converged Model – Shared Network for
IT/Corporate & Measurement/Control
HMI
Sensors Motors
PLCPAC
Control
Network Gateway
Back-End
Servers
Business
Logic
HMI
Sensors Motors
Wireless
DAQ
Ethernet
DAQ PAC
Back-End
Servers
Business
Logic
25
Firewall
• Blocks unauthorized access while permitting outward
communication
• Can also permit, deny, encrypt, decrypt, or proxy all
traffic between different security domains
26
Virtual Local Area Networks (VLANs)
• OSI Layer 2 technology
• Switch ports assigned to a VLAN
• Data is only forwarded to ports
within the same VLAN
• Broadcasts and multicasts are
restricted to their respective VLANs
• A Layer 3 device (router or Layer 3
switch) can pass messages
between different VLANs
1
2
3
4
5
VLAN 1 VLAN 2
VLAN 3
27
VLAN Best Practices
• Logically segment networks (ie,
instrumentation VLAN vs
enterprise VLAN)
• Assign VLANs to devices when
traffic patterns are known
• Limit the flow of
producer/consumer traffic outside
of required devices
• Use Layer 3 switch or router to
exchange data between VLANs
28
Wireless Intrusion Prevention System (WIPS)
• Continuous monitoring of radio spectrum for
unauthorized devices (intrusion detection) and
automatic countermeasures (intrusion prevention)
 Rogue AP
 Man-in-the-Middle
 Ad-hoc
 DoS
 MAC-Spoofing
 Etc.
29
Pulling it All Together
• Logically segmented
network (NIST SP 800-82)
• Firewalls & VLANs
• Demilitarized Zone (DMZ)
• Wireless link encryption
& authentication
• WIPS
Measurement &
Control Network
DMZ
Enterprise
Internet
30
Summary
• Wireless security can be robust when implemented
correctly
• If you are still using WEP, stop…now
• New security technologies are still evolving for WSN
• Start planning with your IT group before they start
planning for you
31
For More Information
Charlie Stiernberg
charlie.stiernberg@ni.com
ni.com/wireless

More Related Content

What's hot

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lectureMartyn Price
 
Attack presentation
Attack presentationAttack presentation
Attack presentationFrikha Nour
 

What's hot (20)

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
WPA 3
WPA 3WPA 3
WPA 3
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
802.11i
802.11i802.11i
802.11i
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
WEP
WEPWEP
WEP
 
Wlan security
Wlan securityWlan security
Wlan security
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 

Similar to Wireless Security Best Practices for Remote Monitoring Applications

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecuritySUBHAK25
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgEric Vanderburg
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015Isam Shahrour
 

Similar to Wireless Security Best Practices for Remote Monitoring Applications (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Wireless Security Best Practices for Remote Monitoring Applications

  • 1. Wireless Security Best Practices for Remote Monitoring Applications Charlie Stiernberg Remote Data Acquisition Product Manager, National Instruments
  • 2. 2 A Wireless Security Story… • The Maroochy Shire sewage treatment plant (Australia)  Between January and April 2000 the sewage system experienced 47 unexplainable faults  Millions of liters of sewage were spilled • On October 31, 2001 Vitek Boden was convicted of:  26 counts of willfully using a computer to cause damage  1 count of causing serious environment harm
  • 3. 3 Agenda • Wireless network security: a history • IEEE 802.11i security for Wi-Fi networks • IEEE 802.15.4 for wireless sensor networks • ZigBee security protocols • Network design best practices: an IT perspective
  • 4. 4 A Brief History of Wireless Security • 1897 – Marconi • 1997 – 802.11, WEP • 2001 – FMS attack • 2003 – WPA • 2004 – 802.11i ratified • 2006 – WPA2 Mandatory http://navajopeople.org/navajo-code-talker.htm
  • 5. 5 Common Wireless Network Threats • Dictionary Attack: brute force method for “guessing” passwords / credentials • Man-in-the-Middle Attack: Rogue AP’s “trick” clients into sending them their security credentials • Denial of Service (DoS): a flood of packets that consumes network resources
  • 7. 7 IEEE 802.11 Overview • “Wireless Ethernet” • High bandwidth for streaming / waveform measurements • 10+ years in the IT sector Version Released Frequency Max PHY Rate Max TCP Rate 802.11 1997 2.4 GHz 2 Mb/s 1 Mbps 802.11b 1999 2.4 GHz 11 Mb/s 14.4 Mbps 802.11a 1999 5 GHz 54 Mb/s 24.4 Mbps 802.11g 2003 2.4 GHz 54 Mb/s 24.4 Mbps 802.11n 2009? 2.4 GHz ~540 Mb/s ~100 Mbps
  • 8. 8 IEEE 802.11 (Wi-Fi) Security • Three levels of IEEE 802.11 security  WEP (weak)  WPA (ok)  WPA2 (best) <IEEE 802.11i> • IEEE 802.11i security has two key components  Encryption = data protection  Authentication = access control
  • 9. 10 Encryption • TKIP = Temporal Key Integrity Protocol (WPA) • AES = Advanced Encryption Standard (WPA2)  NIST-endorsed standard for government agencies  FIPS-approved (FIPS 197) Key size (bits) Number of alternative keys Time required at 1 decryption/us Time required at 106 decryptions/us 32 232 = 4.3 x 109 35.8 minutes 2.15 milliseconds 56 256 = 7.2 x 1016 1,142 years 10 hours 128 2128 = 3.4 x 1038 5.4 x 1024 years 5.4 x 1018 years Time required for exhaustive key search (brute force attack) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • 10. 12 Authentication • Three players in 802.11i authentication  Supplicant = client trying to access network (Wi-Fi DAQ)  Authenticator = WAP hardwired to secured network  Authentication Server = verifies identity of client Supplicant Authenticator Authentication Sever
  • 11. 13 IEEE 802.1X Port-Controlled Authentication Uncontrolled Port Controlled Port 802.1X Traffic Non-802.1X Traffic (Blocked) Before Authentication After Authentication 802.1X Traffic Non-802.1X Traffic (Blocked)
  • 12. 14 802.1X (EAP-Request Identity) 802.1X (EAP-Response Identity) EAP Transport (EAP-Response Identity) EAP-specific (mutual) authentication EAP Transport (EAP-Success, PMK) 802.1X (EAP-Success) Derive Pairwise Master Key (PMK) Derive Pairwise Master Key (PMK) 802.1X Backend EAP Transport 802.1X Message Flow
  • 13. 15 EAP = Extensible Authentication Protocol • EAP is a framework with different implementations • ~40 different EAP methods • Some require passwords/user credentials (PEAP) • Some require client-side and/or server-side certificates (EAP-TLS) • EAP can provide mutual authentication for the network and the supplicant
  • 15. 17 IEEE 802.15.4 Overview Application ZigBee Application Layer (APL) ZigBee Network Layer (NWK) 802.15.4 Medium Access Control Layer (MAC) 802.15.4 Physical Layer (PHY) ZigBee Security Service Provider End User ZigBee Alliance IEEE 802.15.4
  • 16. 18 IEEE 802.15.4 Security • Security services defined in the MAC layer • Access Control List (ACL) Mode  The MAC maintains a list of hardware devices addresses with which it will communicate • Secured Mode adds…  AES encryption up to 128 bits  Frame integrity with message integrity code (MIC)  Sequential freshness appends values to MAC frame to prevent replay attacks
  • 17. 19 ZigBee Overview • ZigBee Coordinator – starts and controls the network • ZigBee Routers – extend network coverage • ZigBee End Devices – transmit/receive messages Star Tree Mesh ZC ZC ZC ZR ZR ZR ZRZRZR ZR
  • 18. 20 ZigBee Security • ZigBee security builds on IEEE 802.15.4  Application and Network Layer security  Key management for encryption and authentication • ZigBee Trust Center  Authenticates joining devices  Manages key distribution in the network • Standard Security Mode • High Security Mode
  • 19. 21 ZigBee Security Keys Keys are used for encryption & authentication • Network Keys  All devices on a ZigBee network share the same key • Link Keys  Secure unicast messages between two devices • Master Keys  Used as an initial shared secret between two devices to perform SKKE to generate link key
  • 20. 22 ZigBee Commissioning & Security • Standard security  Preconfigured with active network key  Preconfigured with a Trust Center link key and address • High security  Preconfigured with a Trust Center master key and address • Not preconfigured (not recommended)
  • 22. 24 IT & Engineering Network Convergence Traditional Model – Separate Networks for IT/Corporate & Measurement/Control Converged Model – Shared Network for IT/Corporate & Measurement/Control HMI Sensors Motors PLCPAC Control Network Gateway Back-End Servers Business Logic HMI Sensors Motors Wireless DAQ Ethernet DAQ PAC Back-End Servers Business Logic
  • 23. 25 Firewall • Blocks unauthorized access while permitting outward communication • Can also permit, deny, encrypt, decrypt, or proxy all traffic between different security domains
  • 24. 26 Virtual Local Area Networks (VLANs) • OSI Layer 2 technology • Switch ports assigned to a VLAN • Data is only forwarded to ports within the same VLAN • Broadcasts and multicasts are restricted to their respective VLANs • A Layer 3 device (router or Layer 3 switch) can pass messages between different VLANs 1 2 3 4 5 VLAN 1 VLAN 2 VLAN 3
  • 25. 27 VLAN Best Practices • Logically segment networks (ie, instrumentation VLAN vs enterprise VLAN) • Assign VLANs to devices when traffic patterns are known • Limit the flow of producer/consumer traffic outside of required devices • Use Layer 3 switch or router to exchange data between VLANs
  • 26. 28 Wireless Intrusion Prevention System (WIPS) • Continuous monitoring of radio spectrum for unauthorized devices (intrusion detection) and automatic countermeasures (intrusion prevention)  Rogue AP  Man-in-the-Middle  Ad-hoc  DoS  MAC-Spoofing  Etc.
  • 27. 29 Pulling it All Together • Logically segmented network (NIST SP 800-82) • Firewalls & VLANs • Demilitarized Zone (DMZ) • Wireless link encryption & authentication • WIPS Measurement & Control Network DMZ Enterprise Internet
  • 28. 30 Summary • Wireless security can be robust when implemented correctly • If you are still using WEP, stop…now • New security technologies are still evolving for WSN • Start planning with your IT group before they start planning for you
  • 29. 31 For More Information Charlie Stiernberg charlie.stiernberg@ni.com ni.com/wireless

Editor's Notes

  1. 9
  2. 11